12

ransomware

Cisco’s 2017 Midyear Cybersecurity Report says destruction of service attacks could leave organizations without a backup to restore systems after an attack. But it also points to a resurgence in traditional attacks, like adware and spyware, as well as a social engineering attack that may be more...

Today’s hackers don’t just encrypt your files and hold them hostage, promising to supply a decryption key after ransom is paid. Many of them also encrypt the file names and extensions and delete all shadow copies of your files. Here’s what you can do to both defend and mitigate.

Half of Canadian companies feel confident in their ability to protect against ransomware, according to a new survey. Yet more than a third of those surveyed were hit with ransomware in the past year, and attacks are much higher here than in the U.S. What’s the disconnect?

The software giant throws in the towel on smartphone hardware, nuclear weapons systems get an upgrade — from the 1970s — and robotic security guards patrol malls. This was one of technology’s weirder weeks. Read all about it in our tech roundup.

This malicious software historically targeted individuals — locking them out of their own devices unless they made an online payment, typically through Bitcoin — but it has more recently begun to target companies, large institutions and enterprise networks.

While the number of attacks is decreasing, they’re becoming more precise in their targeting, more advanced in their methodology and more financially damaging to both individuals and corporations, according to a new report on breaches and vulnerabilities in Canada.

Bill Gates fears the rise of the machines, but is more vague about Apple vs. the FBI. Facebook wants to understand your chat slang and the Mac gets its own ransomware. It’s all happening this week in expertIP’s tech roundup of the best stories online.